This is a required exam for LPI certification Level 1. It covers basic skills for the Linux Professional that are common to major distributions of Linux.

Trainingen

Exameneisen

Topic 105: Shells, scripting and Data management

105.1 Customize and use the shell environmentWeight: 4Description: Candidates should be able to customize shell environments to meet users’ needs. Candidates should be able to modify global and user profiles.Key Knowledge Areas • Set environment variables (e.g. PATH) at login or when spawning a new shell. • Write BASH functions for frequently used sequences of commands. • Maintain skeleton directories for new user accounts. • Set command search path with the proper directory.

105.2 Customize or write simple scriptsWeight: 4Description:Candidates should be able to customize existing scripts, or write simple new BASH scripts.Key Knowledge Areas• Use standard sh syntax (loops, tests). • Use command substitution. • Test return values for success or failure or other information provided by a command. • Perform conditional mailing to the superuser. • Correctly select the script interpreter through the shebang (#!) line. • Manage the location, ownership, execution and suid-rights of scripts.

106.1 Install and configure X11Weight: 2Description: Candidates should be able to install and configure X11.Key Knowledge Areas • Verify that the video card and monitor are supported by an X server. • Awareness of the X font server. • Basic understanding and knowledge of the X Window configuration file.

107.1 Manage user and group accounts and related system filesWeight: 5Description:Candidates should be able to add, remove, suspend and change user accounts.Key Knowledge Areas• Add, modify and remove users and groups. • Manage user/group info in password/group databases. • Create and manage special purpose and limited accounts.

107.2 Automate system administration tasks by scheduling jobsWeight: 4Description: Candidates should be able to use cron or anacron to run jobs at regular intervals and to use at to run jobs at a specific time.Key Knowledge Areas • Manage cron and at jobs. • Configure user access to cron and at services.

107.3 Localisation and internationalisationWeight: 3Description:Candidates should be able to localize a system in a different language than English. As well, an understanding of why LANG=C is useful when scripting.Key Knowledge Areas• Locale settings. • Timezone settings.

Topic 108: Essential System Service

108.1 Maintain system timeWeight: 3Description:Candidates should be able to properly maintain the system time and synchronize the clock via NTP.Key Knowledge Areas • Set the system date and time. • Set the hardware clock to the correct time in UTC. • Configure the correct timezone. • Basic NTP configuration. • Knowledge of using the pool.ntp.org service

108.2 System loggingWeight: 2Description:Candidates should be able to configure the syslog daemon. This objective also includes configuring the logging daemon to send log output to a central log server or accept log output as a central log server.Key Knowledge Areas • syslog configuration files • syslog • standard facilities, priorities and actions

109.4 Configure client side DNSWeight: 2Description: Candidates should be able to configure DNS on a client host.Key Knowledge Areas • Demonstrate the use of DNS on the local system. • Modify the order in which name resolution is done.

Topic 110: Security

110.1 Perform security administrations tasksWeight: 3Description: Candidates should know how to review system configuration to ensure host security in accordance with local security policies.Key Knowledge Areas• Audit a system to find files with the suid/sgid bit set. • Set or change user passwords and password aging information. • Being able to use nmap and netstat to discover open ports on a system. • Set up limits on user logins, processes and memory usage. • Basic sudo configuration and usage.

110.2 Setup host securityWeight: 3Description: Candidates should know how to set up a basic level of host security.Key Knowledge Areas• Awareness of shadow passwords and how they work. • Turn off network services not in use. • Understand the role of TCP wrappers.